A successful attack hands an unauthorized party full administrative control of every website, database, email account, and file hosted on the compromised server, including customer data and business-critical applications. For organizations managing multi-tenant hosting environments, a single exploited server can expose every client account on that infrastructure simultaneously. Regulatory exposure is significant wherever hosted data includes personal information governed by GDPR, state privacy laws, or industry-specific requirements, as unauthorized access to customer data constitutes a notifiable breach in most jurisdictions.
You Are Affected If
You run cPanel or WHM on any version prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, or 11.136.0.5
Ports 2083 or 2087 are accessible from the public internet without IP allowlisting or VPN enforcement
You use a managed hosting provider (e.g., Namecheap, InMotion Hosting) running unpatched cPanel infrastructure and have not confirmed their patch status
You have not implemented firewall-level access restrictions on ports 2083 and 2087 as a compensating control
Your cPanel/WHM update channel is set to manual or delayed, preventing automatic emergency patch pickup
Board Talking Points
A critical flaw in cPanel web hosting software allows attackers to take full control of servers without a password, and active attacks are already confirmed.
Our team must apply vendor-issued emergency patches within 24 hours and restrict administrative access to known IP addresses immediately.
Organizations that do not patch risk losing full control of hosted websites, customer data, and email systems to unauthorized parties, with associated breach notification obligations.
GDPR — cPanel/WHM servers hosting personal data of EU residents; unauthorized administrative access constitutes a personal data breach requiring assessment within 72 hours under Article 33
PCI-DSS — if cPanel/WHM servers are in scope for cardholder data environments, unauthorized access to the control plane is a Requirement 6/8 failure requiring incident response and potential QSA notification